Analysis

  • max time kernel
    549s
  • max time network
    436s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-08-2024 17:16

General

  • Target

    DocuSign.vhd

  • Size

    270.0MB

  • MD5

    53ab0e1575f7785c7d4b774b3f70449b

  • SHA1

    43dff693fa84f727ed70eecdb019beb103d07a19

  • SHA256

    387e7dc9ff57715da374a9c768c67df9ce062d030f8417dbca0e7bb58d16f028

  • SHA512

    f13e93fa7b148c9122a93eb417621a252728d5aa2318db243ec04c552b7a5979a6a18f1b277d25823299b3211d6c083a793590551300069c7b2454f7490a9bca

  • SSDEEP

    3145728:nVlMuAqzL0BYuJ/i72qy+B1OJ3VAXpznEze5RM4vp2fpgoi:U1fKyZqyoMJwJc4B2fpG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DocuSign.vhd
    1⤵
    • Modifies registry class
    PID:4988
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1228
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:2272
      • \??\E:\DocuSign_01106524.pdf.exe
        "E:\DocuSign_01106524.pdf.exe"
        1⤵
        • Loads dropped DLL
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2876
        • \??\E:\App\PDFXEdit\PDFXEdit.exe
          "E:\App\PDFXEdit\PDFXEdit.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\SYSTEM32\msiexec.exe
            msiexec.exe /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi" /Qn
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3588
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3380
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 74EC8A53F893044295124FDCB992043D
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4992
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-05c225b7-874f-4f51-98df-5a4854ebb504\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
            3⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:3972
          • C:\Windows\SysWOW64\EXPAND.EXE
            "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
            3⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:2896
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3328
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-05c225b7-874f-4f51-98df-5a4854ebb504\files"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1204
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-05c225b7-874f-4f51-98df-5a4854ebb504\." /SETINTEGRITYLEVEL (CI)(OI)LOW
            3⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:2792
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 7B73D63B47AC662406F16F1D57A335DB
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-044d2bc2-0972-4d5f-bb62-17f71a44f3aa\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
            3⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:684
          • C:\Windows\SysWOW64\EXPAND.EXE
            "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
            3⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:1240
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1612
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-044d2bc2-0972-4d5f-bb62-17f71a44f3aa\files"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1428
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-044d2bc2-0972-4d5f-bb62-17f71a44f3aa\." /SETINTEGRITYLEVEL (CI)(OI)LOW
            3⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:4804
      • \??\E:\DocuSign_01106524.pdf.exe
        "E:\DocuSign_01106524.pdf.exe"
        1⤵
        • Loads dropped DLL
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4772
        • \??\E:\App\PDFXEdit\PDFXEdit.exe
          "E:\App\PDFXEdit\PDFXEdit.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\SYSTEM32\msiexec.exe
            msiexec.exe /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi" /Qn
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi

        Filesize

        1.6MB

        MD5

        e4ac19312fa3761fccfef682e3c6a294

        SHA1

        cf0d6215439ed971a570fc591d1fa1873d5ffdd2

        SHA256

        43e898d536e59020c3f83ee2501871a8746eb63c1fbc6c68127a72557e1d724f

        SHA512

        a6ae363a7cd22d80ef21ec996e0597ce74651bc5d6ed4ea74c7d8f603792a083be3269e674e69d66877f33c1c31d40d8e0ab0c6fbee52e4f5ccddd72f7d479f3

      • C:\Users\Admin\AppData\Local\Temp\MW-044d2bc2-0972-4d5f-bb62-17f71a44f3aa\msiwrapper.ini

        Filesize

        1KB

        MD5

        a0d80aa534f0eef82c129c1e610655d4

        SHA1

        b74e8aced8bb58139d79d98e8f96240ec2f9f72b

        SHA256

        ee5d16d7c780ae1c12ca02b0ec8958defaeb5bfe2d12e3c68d22bbae6d5c868d

        SHA512

        44d89791f17ba8a14a8db8cae4a571af0c6a1e8394e7096d3e165deddb39ae0ab966b3b686d784b6e3e4a6bebbeac07baf0ca2f7393fea0ec3fe043f1853fc2f

      • C:\Users\Admin\AppData\Local\Temp\MW-044d2bc2-0972-4d5f-bb62-17f71a44f3aa\msiwrapper.ini

        Filesize

        1KB

        MD5

        27b7bbcdbe38d79653f69415306bbcad

        SHA1

        1ae44a9c8b885ad6fb969b81c54ba35532e61a7b

        SHA256

        a9b9c03e8f3ec3bbef458825fb8c1e77f8b36d4075be0c62b36a27c8e3254484

        SHA512

        64d7f0bff90604434aed03d46985328e6102f1514c8951fa0dcd9f40c45d78b6c1cddeca22bb21eb6d3c150877d937e9dd7069e380389e10b254deb8bcec0dc6

      • C:\Users\Admin\AppData\Local\Temp\MW-05c225b7-874f-4f51-98df-5a4854ebb504\files.cab

        Filesize

        1.3MB

        MD5

        6491f402f8c7e173e5c39e5aca1cae70

        SHA1

        69a9d086e45faa37f0cb530816c5d0dc9f41865c

        SHA256

        7c93971cdf5f474af0a3962eb994da97b7b2b7a9ff68ddfdc1f3cc7306711c82

        SHA512

        bab95427526601913327afe912758a3cb92592422b7ac6e3068bce16f3e991afafe3635bcf163437f8e16d3a71c8a6bd0b0a41c2c6a44d386117602255f36693

      • C:\Users\Admin\AppData\Local\Temp\MW-05c225b7-874f-4f51-98df-5a4854ebb504\msiwrapper.ini

        Filesize

        1KB

        MD5

        4eedb5d9e232ae9c63c4c7c9d1ea9257

        SHA1

        bce16b826b5ddd6408c3013882c23341b6040cb4

        SHA256

        1cd6698440dd3e9aed342cfa14e9a3438c41e5069a9c833019d45f2f913848de

        SHA512

        d71f453ed008b03dd0c199ee3747fff3f35dcdc3078226d799324604454f70d239956b695032d6e293d9e0a01992dcc374a13e59bed82b811db71c94efa455fd

      • C:\Users\Admin\AppData\Local\Temp\nskA97C.tmp\System.dll

        Filesize

        11KB

        MD5

        bf712f32249029466fa86756f5546950

        SHA1

        75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

        SHA256

        7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

        SHA512

        13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

      • C:\Users\Admin\AppData\Local\Temp\nskA97C.tmp\launcher.ini

        Filesize

        231B

        MD5

        51af01dcd135e3fd6ca517a2a0838018

        SHA1

        6809531ae339efe437f786ec06256b8fb6adff33

        SHA256

        1a642192722b70acb34945adc2f9779f37a49e4dde1e839861a9f74326028b39

        SHA512

        f9d9cfc4dbafa31d2b761e9b2604c5f7c77fea21a691f3cf4a5ab2dea8a968a540b027df57a8e28b8297b4de2e1d21ee08cf3086f5cc7bb9deac1711c5431ea5

      • C:\Users\Admin\AppData\Local\Temp\nskA97C.tmp\newadvsplash.dll

        Filesize

        8KB

        MD5

        55a723e125afbc9b3a41d46f41749068

        SHA1

        01618b26fec6b8c6bdb866e6e4d0f7a0529fe97c

        SHA256

        0a70cc4b93d87ecd93e538cfbed7c9a4b8b5c6f1042c6069757bda0d1279ed06

        SHA512

        559157fa1b3eb6ae1f9c0f2c71ccc692a0a0affb1d6498a8b8db1436d236fd91891897ac620ed5a588beba2efa43ef064211a7fcadb5c3a3c5e2be1d23ef9d4c

      • C:\Windows\Installer\MSIB021.tmp

        Filesize

        208KB

        MD5

        0c8921bbcc37c6efd34faf44cf3b0cb5

        SHA1

        dcfa71246157edcd09eecaf9d4c5e360b24b3e49

        SHA256

        fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

        SHA512

        ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

      • C:\Windows\LOGS\DPX\setupact.log

        Filesize

        227KB

        MD5

        63176e4aac8adb1de3c5df61e5238428

        SHA1

        4575f2d8407506a42816dd080a9908ff9a200bee

        SHA256

        2a115d421083f6a8de1544f3f0840dd8584ab8b68732d27e50fb077e4260382b

        SHA512

        4dc1e75cd8990f1da6032533305a1ac7272b232a5b6567b124e21417d5d09015de55adde64cbdb01741d50edddf22fa064ecc31c5a0ae353171ebabf1d2106f5

      • \??\E:\Data\settings\PDF-XChangeEditorPortableSettings.ini

        Filesize

        146B

        MD5

        2cc781e36e461c2bccdca32db8ae326e

        SHA1

        7609ad2b814f17de05b41afe7758c182ae176b37

        SHA256

        6c76b52c277ac0ba64da6b1cbf76185e410b8293c19495bf29b4caf1c8c8f8c2

        SHA512

        3aa7eda5cd690ea803994e06c0bc5f1a30adf8210c67d7c8165619dcd2686a81b467aa21d53c4e17c64a88b6413597e4efc08803b955775f85b110c3d630bd57

      • \Device\HarddiskVolume5\Data\PortableApps.comLauncherRuntimeData-DocuSign_01106524.pdf.ini

        Filesize

        86B

        MD5

        5952a4e29626460e948e127c2af5932d

        SHA1

        977b3993a22c1fa908ec937996db917b4c171089

        SHA256

        e22a31379b54542e3422aedff7ff1ae86fceba1031dfb8df57782c7df8c2ea53

        SHA512

        2aa1f82c970c68645bdb15af817c2679bde0ee08ef7aaba4c4383278080abb06d350b86e5ca28f3787a4274b83fd40f053d58923eb545ab6b590dae1dd4b7b72

      • \Device\HarddiskVolume5\Data\PortableApps.comLauncherRuntimeData-DocuSign_01106524.pdf.ini

        Filesize

        86B

        MD5

        775d0775f77ffe2b0bb758d05ca0a965

        SHA1

        9090188cc0cc1321325b488e514c649aeb967708

        SHA256

        7e9d0d736ffac010f0347e4a87c7263b1e47656ce3c4e877cfebcf527d463d7a

        SHA512

        98f1693df5901158b80b50e153c3360b91321f76f2acb98667a8c8fa59f7035f6d7168418c386fe14255d2cc8e81ca17cd1782190829f8ee73cd14eff749d34f